{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00150413","sets":["8512:8652:8653:8535:8539"]},"path":["8539"],"owner":"1","recid":"150413","title":["L-030 Design of User Support System for Combating against Malware"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-08-20"},"_buckets":{"deposit":"963a1da5-9262-4405-bcd1-d1fb676bd17b"},"_deposit":{"id":"150413","pid":{"type":"depid","value":"150413","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"L-030 Design of User Support System for Combating against Malware","author_link":["252974","252975","252976","252972","252973"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"L-030 Design of User Support System for Combating against Malware","subitem_title_language":"en"}]},"item_type_id":"26","publish_date":"2010-08-20","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_26_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"Hitachi, Ltd.","subitem_text_language":"en"},{"subitem_text_value":"KDDI Corporation","subitem_text_language":"en"},{"subitem_text_value":"SecureBrain Corporation","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/150413/files/KJ00006917539.pdf"},"date":[{"dateType":"Available","dateValue":"2010-08-20"}],"format":"application/pdf","filename":"KJ00006917539.pdf","filesize":[{"value":"467.9 kB"}],"mimetype":"application/pdf","accessrole":"open_date","version_id":"209db4e6-d467-4160-9cb9-cac26ce89cc6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2010 by IEICE,IPSJ"}]},"item_26_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kawaguchi, Nobutaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoda, Takayuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kawaguchi, Tatsunoshin","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kasagi, Toshihiko","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hosizawa, Yuji","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_26_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA1242354X","subitem_source_identifier_type":"NCID"}]},"item_26_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In paper, we describe a design of a user support system for comprehensive countermeasures against malware by coordinating various anti-malware functions that are developed by different security organizations individually. As a lot of new malware appears every day, most of conventional anti-malware solutions relying on signature strings become less effective. In meantime, many security organizations develop their own antimalware functions such as behavior analyzers. However, it is difficult for most end users with little knowledge on security to effectively utilize them, because each of the functions implements only a part of the procedure required for malware countermeasures, and the single use of each function does not achieve comprehensive solution. Our proposed system divides the procedure into several functions, and allows each security organizations to focus on developing particular functions individually, taking advantage of their expertise and strength. Then, the system coordinates the various anti-malware functions through standardized interfaces, and provides end users with a comprehensive countermeasure, ranging from suspicious file detection in user PCs to malware removal from user PCs.","subitem_description_type":"Other"}]},"item_26_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"244","bibliographic_titles":[{"bibliographic_title":"情報科学技術フォーラム講演論文集"}],"bibliographicPageStart":"241","bibliographicIssueDates":{"bibliographicIssueDate":"2010-08-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"9"}]},"relation_version_is_last":true,"weko_creator_id":"1"},"id":150413,"updated":"2025-01-20T16:25:23.089193+00:00","links":{},"created":"2025-01-19T00:25:10.667508+00:00"}